RE: [WIRELESS-LAN] WLAN Deployment-High number of users

2009-05-22 Thread Scholz, Greg
We are a Brocade (OEM Meru) wireless shop and use MS IAS for radius. You
can use the nas-ip-address attribute which is the IP of the controller
and the called-station-id which in Meru/IAS land is the Mac of the
controller:SSID (unlike Cisco per the posting below where it is the AP
mac:SSID - I actually wish we could get the AP Mac).

 

So you may be able to get the NASID either by one of these attributes +
the SSID from the called-station-id using wildcard matching.

 

If these are more like fat APs where it will always be the AP's  IP or
MAC (not the controller's) reported as the NAS then what about if
putting all their management IPs into logical groups so you could
wildcard match on a portion of the APs Mac? Just another thought.

 

 

Hope this helps,

Greg

 

 

 

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Johnson, Bruce
T
Sent: Friday, May 22, 2009 3:42 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] WLAN Deployment-High number of users

 

Thanks Mike and Lee,

 

If I could somehow leverage the NASID and SSID as a name-couplet, this
would provide the differentiation I need while making provisioning
relatively simple (I don't want to have to resort to MAC addresses).
The packet data pretty much reflects what I see in the RADIUS logs on
the Cisco ACS.  It's in the creating of the policy where the wireless
rubber meets the road.   

 

Much appreciated guys,

 

--Bruce Johnson

 



From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Lee H Badman
Sent: Friday, May 22, 2009 8:26 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] WLAN Deployment-High number of users

 

It may be stating the obvious, but if you use AD, you can leverage
attributes there to allow/restrict a range of network/WLAN functions...

 

Lee 



From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Mike King
Sent: Friday, May 22, 2009 7:53 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] WLAN Deployment-High number of users

 

It all depends on:

1.  Your Wireless AP / Wireless Controller Implementation

2.  Your Radius Server's ability to use policies.

 

Each Radius server returns different information in a RADIUS packet.
The Cisco Controllers return the attributes of:

  CalledStationID 00-00-00-00-00-00:SSID(Where 00-00-00-00-00-00 is
the AP's MAC, and SSID is the SSID they are connecting to)

  CallingStationID 00-00-00-00-00-00  (Where 00-00-00-00-00-00 is the
MAC of the laptop)

  NASIPv4Address 0.0.0.0  (Where 0.0.0.0 is the IP of the Wireless LAN
Controller 

  NASIPv6Address - 

  NASIdentifier Controller-Name(Where Controller-Name is the name of
the controller as configured in the WebGUI) 

  NASPortType Wireless - IEEE 802.11  

  NASPort 29   (The port number, I think with LAG ports, it's always 29)

 

The second part of the question, is can your Radius Server deal with
this information.

I know IDEngines has the concept of policies.  I know NPS (IAS for
server 2008) also has policies, and I know know FreeRADIUS can pull of
some cool matching features.

 

NPS and IDEEngines allows you to create policies that match like
firewall rules, and apply based on policy matches.  I'm unsure if IAS on
2003 can do this.  I'm not sure Steel belted Radius has this
functionality.  It didn't when I looked at it 4 years ago, but that is a
very long time ago in a product lifecycle for a currently shipping
product.

 

Mike

 

  

 

On Thu, May 21, 2009 at 8:06 PM, Johnson, Bruce T
bjohns...@partners.org wrote:

Jason et al,

 

Following up on the earlier the two-SSID Nirvana (open and EAP-TLS)
dialogue.

 

We have a multi-controller/multi-campus environment.  I'd love to have a
single EAP-TLS SSID handle all devices/applications, several with unique
walled-garden isolation requirements that would otherwise require their
own SSID.  How difficult is this to manage when you have to
differentiate by controllers and campus-specific subnets?  

 

Can you combine attributes like NAS (controller) IP and device
credentials to serve up locally-significant VLANs?  

 

Overall, has moving the administrative burden to RADIUS been a net gain
in terms of RF cleanliness and client simplicity?

 

Regards all,

 

--Bruce Johnson

 



From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Jason Appah


Sent: Friday, May 15, 2009 4:43 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] WLAN Deployment-High number of users

 

It wasn't particularly difficult and many attributes from login name,
authenticator type, location, machine name,  and snmp names can be used
to differentiate 

RE: [WIRELESS-LAN] Wireless network names

2009-03-31 Thread Scholz, Greg
KSC_Guest - blusocket controlled, internet access only

KSC_Student - no controls or encryption but dumps in behind our CCA so
they have to log in there to get anywhere. Student primarily use this
because of simplicity.

KSC_Secure - WPA, 802.1x, required for fac/staff to access any on campus
resources. Optional for students. If students select it our
controller/radius arrangement puts them into the same vlan as the
KSC_Student SSID so they also have to comply with CCA including the
login. Very few students use it since it would require specific settings
on their PC and two logins

Couple other select ones for special applications. All begin with
KSC_. So it seems we are nearly the same as you.

_

Thank you,

Gregory R. Scholz

Director of Telecommunications

Information Technology Group

Keene State College

(603)358-2070

 

--If you don't have time to do it right, when will you have time to do
it over?

--Do not let what you cannot do interfere with what you can do.

- John Wooden

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Nathan Hay
Sent: Tuesday, March 31, 2009 3:12 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Wireless network names

 

We are trying to decide on some network names for our various networks
and we are looking for input from other schools.

 

Would anyone mind sharing their SSID names and a brief description of
their target audience of devices/users?

 

We are specifically interested in choosing a new name for our SSID that
is primarily for smartphone/PDA/iPhone/iPod touch devices.

 

Here's what we have currently:

 

cedarwireless-guest:  coffee shop type wireless with limited access,
only in academic buildings

cedarwireless-special:  non-broadcast SSID for
smartphone/PDA/iPhone/iPod touch and game consoles

cedarwireless-unsecure:  clear network with captive portal for laptops
(students and others)

cedarwireless-secure:  WPA2-Enterprise network for laptops (students and
others)

 

Thanks,

 

Nathan

 

 

 

 

 

 

Nathan P. Hay
Network Engineer
Computer Services
Cedarville University
www.cedarville.edu http://www.cedarville.edu/  

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



RE: [WIRELESS-LAN] NAC polling: Wired AND Wireless

2009-03-06 Thread Scholz, Greg
I would challenge the AD is NAC in and of itself statement also :-)
AD is system access control, not network.

Philippe - we are not nearly your size but are currently evaluating
products to get to campuswide NAC. Currently CCA for students only. 2800
on campus, 5K total - we NAC students in the reshalls and all student
wireless. Day one will just replace the current situation, but I hope to
extend that somewhat next year.

My intention is to head toward NACing every network access method for
every port - wired ports, wireless, remote access.

The policy and control is still to be discussed but for example, just
because you use NAC doesn't mean you can't have guests, it just means
that anonymous guests get X access, but the NAC can determine and
enforce that at connect time for the given connection.

Anyway someone at this past EDUCAUSE gave a great presentation on their
methodology as they went through the project. Here is a link to the
presentation materials. We used this info extensively in our evaluation
thus far of the plethora of NAC products out there.
http://connect.educause.edu/Library/Abstract/NetworkAdmissionControlAS/4
7521


_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070

--If you don't have time to do it right, when will you have time to do
it over?
--Do not let what you cannot do interfere with what you can do.
- John Wooden




-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Lee H Badman
Sent: Friday, March 06, 2009 11:34 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] NAC polling: Wired AND Wireless

We are using Impulse on our entire primary wireless network, and wired
in the dorms- and we're well into the thousands. For the admin side,
we're sort of running with the notion that AD is NAC in and of itself,
but that sometimes gets challenged...

No wired 802.1x for us- I think personally I'd rather be poked in the
eye with a stick, but it does get tossed around on occasion. 

Lee H. Badman
Wireless/Network Engineer
Information Technology and Services
Syracuse University
315 443-3003

-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Philippe Hanset
Sent: Friday, March 06, 2009 11:26 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] NAC polling: Wired AND Wireless

All,

UTK is in the midst of a network redesign.
A big part of it involves Network Access Control.

Is anyone out there with a comparable size campus, or bigger,
(26,000 student, 5000 Fac/Staff), implementing a commercial NAC system
for ALL users  and all networks (Wired and Wireless).

We are evaluating products. They work somewhat fine during the  pilot  
(with major security holes ),
but we have this really strong hunch that those products will not size  
well!

Any input is welcome,
(except sales pitch ;-)

Thank you,

Philippe Hanset
Univ. of TN

p.s.: Are you doing 802.1x on Wired?

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] radius reporting

2009-02-25 Thread Scholz, Greg
Nothing routine as it is fairly new to us but it can do qty users, qty
connections in a period of time, access accepts, access rejects, I think
if you set up accounting it can give accounting information.

 

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Urrea, Nick
Sent: Wednesday, February 25, 2009 12:15 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] radius reporting

 

What kind of information do you poll in your reports?

We currently have IAS setup on Windows 2003 server.

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Scholz, Greg
Sent: Tuesday, February 24, 2009 11:10 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] radius reporting

 

I've been using IASViewer for our IAS server. I am not sure if it works
for 2008 version. I also don't know if it can send notices but it does
allow for many report options.

http://www.deepsoftware.com/iasviewer/

 

 

_

Thank you,

Gregory R. Scholz

Director of Telecommunications

Information Technology Group

Keene State College

(603)358-2070

 

--If you don't have time to do it right, when will you have time to do
it over?

--Do not let what you cannot do interfere with what you can do.

- John Wooden

 

 

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Tupker, Mike
Sent: Tuesday, February 24, 2009 1:09 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] radius reporting

 

We are using server 2008 network policy server for 802.1x
authentication. I was wondering if anyone knows of any good reporting
tools that can look at the MS radius logs and generate usage reports and
or send notices when specific users sign on to the network? Currently
I'm just been opening up the log files in notepad but that is getting a
little annoying, especially with large log files.

 

Mike Tupker

Systems Administrator

Mount Mercy College

Office: (319) 363-1323 x1401

Mobile: (319) 538-1644

If you need assistance with an computer issue please contact the
helpdesk at x4357 or http://help.mtmercy.edu http://help.mtmercy.edu .

 

 

 

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



RE: [WIRELESS-LAN] radius reporting

2009-02-24 Thread Scholz, Greg
I've been using IASViewer for our IAS server. I am not sure if it works
for 2008 version. I also don't know if it can send notices but it does
allow for many report options.

http://www.deepsoftware.com/iasviewer/

 

 

_

Thank you,

Gregory R. Scholz

Director of Telecommunications

Information Technology Group

Keene State College

(603)358-2070

 

--If you don't have time to do it right, when will you have time to do
it over?

--Do not let what you cannot do interfere with what you can do.

- John Wooden

 

 

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Tupker, Mike
Sent: Tuesday, February 24, 2009 1:09 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] radius reporting

 

We are using server 2008 network policy server for 802.1x
authentication. I was wondering if anyone knows of any good reporting
tools that can look at the MS radius logs and generate usage reports and
or send notices when specific users sign on to the network? Currently
I'm just been opening up the log files in notepad but that is getting a
little annoying, especially with large log files.

 

Mike Tupker

Systems Administrator

Mount Mercy College

Office: (319) 363-1323 x1401

Mobile: (319) 538-1644

If you need assistance with an computer issue please contact the
helpdesk at x4357 or http://help.mtmercy.edu http://help.mtmercy.edu .

 

 

 

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



RE: [WIRELESS-LAN] Transitioning to dot1x

2009-02-19 Thread Scholz, Greg
We don’t see this but have you checked the “support fast roaming” (or something 
like that) setting on the IAS and clients?

 

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Bob Richman
Sent: Thursday, February 19, 2009 10:38 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Transitioning to dot1x

 

We are using MS IAS for radius  with PEAP. We don’t have trouble getting folks 
configured and connected. Just after that we get complaints of ‘getting kicked 
off’ and was wondering if anyone else sees this sort of behavior. I suspect 
this mostly occurs during roams, but don’t really have any hard data to back 
that up.

 

Thanks, 

Bob Richman

Network Engineer

University of Notre Dame

 rrichma...@nd.edu

From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Daniel Bennett
Sent: Thursday, February 19, 2009 8:20 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Transitioning to dot1x

 

We have a separate PDA network with MAC filtering and restricted ACLs to make 
up for MAC filtering being weak.

 

Daniel Bennett

IT Security Analyst

Security+

 

PA College of Technology

One College Ave

Williamsport PA 17701

(P) 570.329.4989

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Lelio Fulgenzi
Sent: Thursday, February 19, 2009 8:15 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Transitioning to dot1x

 

Last time I checked, Windows mobile didnt come with a dot1x supplicant (that 
worked). Do you require users to purchase their own supplicant or do you have a 
site license?

Lelio Fulgenzi, Senior Analyst

Computing  Communications

University of Guelph

519-824-4120 x56354

 

...sent from my iPod - please pardon my fat fingers ;) 

 

[XKJ2000]


On Feb 19, 2009, at 8:09 AM, Lee H Badman lhbad...@syr.edu wrote:

Hi Bob-

 

We’ve been doing dot1x now for a few years, and in my opinion people 
tend to struggle with:

 

-  What EAP type to use

-  What RADIUS server to use

-  How to get supplicants configured, and whether or not to 
support a variety of supplicants

-  What about AD machines over wireless

 

We chose PEAP w/ MS-CHAPv2 because it’s well supported natively in both 
Windows and Mac machines. That being said- we had to say no more support for 
Windows 2000, 98, Me, etc. Same on Mac- a minimum OS was required. We avoided 
other EAP types that require a per-device cert, and officially only support the 
native Windows supplicant and native Mac supplicants for ease of support. 

 

We also chose to stick with our “classic” Cisco ACS 3.3.3 boxes- simply 
because we already had them, and they do a rock-solid job as well as provide 
decent logs (important). They also talk well with our AD credential store for 
user credential verification.

 

We have found the ID Engines- now Cloudpath- supplicant configuration 
tool to be key to our success in that we can point users to a “help SSID” for 
initial client config, or self-remediation later if they hose their settings. 
Very powerful- but again, requires that users use Windows and Mac native 
supplicants and disable all of the ProSet, Broadcom, Toshiba, etc wireless 
utilities. We also provide basic settings in document form for advanced users 
that won’t give up their third party utilities, and for Linux/handheld users 
that we can’t auto-configure.

 

Driver issues will manifest themselves more on a dot1x network- the 
rule of thumb is to keep them updated, or as a minimum, update before going to 
1x. This often helps windows machines when nothing else will. On the Macintosh 
side, unfortunately it seems that even minor code updates can wreak havoc on 
the wireless driver and 1x utility- but once you get past whatever new curve 
ball Apple throws you, they work very reliably. 

 

As for AD machines on wireless- is a whole different ballgame. 
Officially, we do not support AD machines over our wireless networks, but if 
the machine name is the same as the userID, it will work in our environment.

 

Then there’s loaner laptops… and NAC integration… and how to handle 
visitors on the network. All have solutions, but you may have to get creative.

 

We have 2000+ APs, 12 WiSMs, and typically see 5,500-6,000 users at 
peak on our wireless networks daily. In the dorms (100% covered) wired usage 
has fallen to less than 20% of what it was 2 years ago, and has become mostly 
an “entertainment” network. 

 

-Lee

 

 

Lee H. Badman

Wireless/Network Engineer

Information Technology and Services


RE: [WIRELESS-LAN] Transitioning to dot1x

2009-02-19 Thread Scholz, Greg
One caution I would put out for any product that can do machine
authentication is to realize that it means the supplicant is working
prior to user interactive login and with access to system level
credentials. And then does it change over to the users creds once they
login interactively?

One experience I had with this was about 5-6 years ago. The Cisco VPN
client at the time (don't know if it still does) could be run before
login. To accomplish this it replaced the MSGINA (the program that is
the login box) so that that it could supersede it to allow the VPN
client to interact with the user prior to the user proving credentials
to the machine.

I can't say that it caused us any issues but raised some concerns...
1) what if multiple things for whatever reason try to do this (replace
the MSGina) what is the order of preference
2) potential bug and/or exploit in the process
3) making OS patches and updates and upgrades dependant on yet another
piece of software that is probably very sensitive to OS changes

FYI - the dell utility does allow a user to logon even if they don't
have locally cached credentials as long as they have an AD account. You
need to explicitly set it, but when setup properly the machine account
does not authenticate but the user's credentials are somehow passed to
the Dell utility to bring up the wireless under their credentials
before the MSGina tries to log into the machine. Once the wireless is
connected under the users creds, then the users credentials are sent
through the MSGina like normal. Works pretty slick, but I wanted to use
the machine credentials so our sys admins could manage the machine as
long as it was on just like wired PCs.

This is a case where I have found it simplest to just use the built in
functionality and so far really the only problem I have seen is poor
reporting to troubleshoot with. Luckily the only troubleshooting
necessary was when we first got our 1x setup. Since then it has worked
very well with machine credentials.


_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070

--If you don't have time to do it right, when will you have time to do
it over?
--Do not let what you cannot do interfere with what you can do.
- John Wooden





-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Oliver Gorwits
Sent: Thursday, February 19, 2009 2:56 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Transitioning to dot1x

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Johnson, Bruce T wrote:
 One useful application with WZC-based PEAP is machine
 authentication for unattended devices that need to stay
 connected.  I'm not sure any non-native supplicant supports this.

I've not used the software, but the Open1X supplicant now mentions
machine authentication as a feature, in their new release:

   http://open1x.sourceforge.net/

I hear good things about the software, which seems to be under
active development.

HTH,

- --
Oliver Gorwits, Network and Telecommunications Group,
Oxford University Computing Services
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJnblj2NPq7pwWBt4RAhEIAKDmCu+BRg0q7Zq0KqAJ1vPdFSWRuACg0ynR
q1OegU96m/HNF4+MSdyANh0=
=nJrs
-END PGP SIGNATURE-

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] wired/wireless business model question

2009-01-27 Thread Scholz, Greg
We currently charge for each wired port and for each installed AP and
maintain that the wireless is not a replacement for standard office
connectivity. We know that eventually it could be but today all the
support that goes along with a wired jack (imaging, remote control, PXE
boot) is just not there yet on the wireless. So if we knew of anyone
doing that we would tell them that to get support they have to move it
back to wired. All our PCs are centrally managed.
Our charge model: http://www.keene.edu/it/networksvs/chargeback.cfm
Our wireless charge info:
http://www.keene.edu/it/networksvs/wirelessbilling.cfm

We are currently reviewing both how we provide these services and the
appropriate funding model to ensure continued support and maintenance so
it may look very different in the near future.


_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070

--If you don't have time to do it right, when will you have time to do
it over?
--Do not let what you cannot do interfere with what you can do.
- John Wooden






-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Philippe Hanset
Sent: Tuesday, January 27, 2009 4:47 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] wired/wireless business model question

Our current business model relies on charged for wired ports to fund  
wireless.
A few months ago, we received from our Tech-Fee budget a special  
fund to upgrade
the WLAN to 802.11n.

Even with 802.11g, we already see departments moving away from wired  
ports
to save a few bucks, or to save a percentage of a faculty position  
that may be cut otherwise.

I cannot imagine the wave of disconnections that will follow the  
upgrade to 802.11n!

Obviously this current business model is outdated, and needs a major  
revision.

What are other schools doing?

-IT fee per employee
-Like European ISPs...X-Gigabytes/month/employee, excess are charged  
for.
...

Thank you for your time,

Philippe Hanset
Univ. of TN

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] ceiling mounting APs

2009-01-23 Thread Scholz, Greg
I like your idea for the rods suspended to below the mech equipment.
Also, are you using cable tray? If so is it below the mech equipment
and/or close enough to where you need the APs - if so, hang them from
that. 

 

I don't necessarily like this idea but what about an antenna extension
cable - leave the AP on the hard ceiling and extend the antenna to below
the mech equipment.

 

Wall mount around the perimeter should work as well and/or on some of
the columns. Even with few walls I suspect the facility is not wider
than could be covered.

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:wireless-...@listserv.educause.edu] On Behalf Of Jamie Savage
Sent: Friday, January 23, 2009 1:26 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] ceiling mounting APs

 


Hi, 
We have a new building currently under construction and we're
looking at how best to mount our APs once the site surveys etc have been
completed.  This is an open concept building...ie...a few pillars but
not too many walls.  It is also the first building we have where there
will be no drop ceiling.ieeverything's open up to the concrete
slab ceiling (12' ceilings).  The easy answer is to simply mount the APs
to the slab but that would put them above the mechanical
infrastructure...ie...ductwork, lighting, pipes etc.  How have others
deployed in such a situation.   I foresee us mounting the APs on rods
suspended from the concrete slab that would hang down to a length that
puts the APs below the mechanical equipment. Other comments or
suggestions? 

.thanks in advance.J 

James Savage   York University

Senior Communications Tech.   108 Steacie Building
jsav...@yorku.ca4700 Keele Street
ph: 416-736-2100 ext. 22605Toronto, Ontario
fax: 416-736-5701M3J 1P3, CANADA
** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.



RE: [WIRELESS-LAN] Channel Selection on APs

2008-10-16 Thread Scholz, Greg
In Meru you pick the channel but it uses a single channel across the
entire SSID when in virtual cell mode, not per AP.
(this is part of the special sauce that they got beat up for a while
ago by other vendors implying they were breaking the standard)

So we don't have to worry about overlapping channels or power settings.




-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Ken Connell
Sent: Thursday, October 16, 2008 10:01 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Channel Selection on APs

Aruba handles the RF (channel  pwr levels) dynamically...one less
worry...


Ken Connell
Intermediate Network Engineer
Computer  Communication Services
Ryerson University
350 Victoria St
RM AB50
Toronto, Ont
M5B 2K3
416-979-5000 x6709

- Original Message -
From: Martin Jr., D. Michael [EMAIL PROTECTED]
Date: Thursday, October 16, 2008 9:52 am
Subject: [WIRELESS-LAN] Channel Selection on APs
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU


 In the past, we have always setup wireless access points to use 
 channels 3, 6, and 11, since these channels are the non-overlapping 
 channels.  We have tried to be careful in spacing out APs and picking 
 one of these three channels where it seems appropriate to prevent 
 interference from one another.
  
  A question was posed by someone in my staff about using the least 
 congested channel setting instead of going through all the trouble of

 determining and setting the channel.
  
  So, the questions are...
  
  1.  What are you other institutions doing about channel selection on 
 your Access Points?
  2.  If you are using 3, 6, and 11, what is your strategy for use and 
 what problems and/or successes have you seen?
  3.  If you are not using 3, 6, and 11, why not? What are you doing? 
 And what problems and/or successes have you seen?
  
  
  Any input is appreciated.
  
  Thanks,
  
  D. Michael Martin, Jr.
  Network Administrator
  University of Montevallo
  
  **
  Participation and subscription information for this EDUCAUSE 
 Constituent Group discussion list can be found at
http://www.educause.edu/groups/.
  

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Network Access Control

2008-09-11 Thread Scholz, Greg
We had CCA for wired residential (e.g. students) access for a few years
and recently applied it to the wireless.

We have 3 wireless networks - the one for students now uses CCA. Our
guest wireless does not have NAC but does challenge for email address
(basically anonymous) but we restrict what can be done over the guest
access to minimize risk and eliminate access to on campus resources.

See rest below

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of John Duran
Sent: Thursday, September 11, 2008 10:54 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Network Access Control

 

Good Morning All,

 

Who is using NAC (Network Access Control) for wireless client
authentication and posturing? 

1)What solution did you select?

a. CCA

2)How easily did it integrate with you existing infrastructure?

a. Very easily, just added a corresponding VLan to CCA for the
student wireless vlan/ssid

3)What is you existing infrastructure and wireless solution?

a. We use Foundry wired and wireless (wireless is rebranded Meru)

4)How well has it performed?

a. Very well since it was already in use for a few years on the
wired

5)If you had to do it again would you select the same product?

a. Yes - from the perspective of using the same solution for wired
and wireless - but if/when we move from CCA it would be for both wired
and wireless to keep them the same

6)What were the success and failures of the deployment?

a. success - simplicity/familiarity, failure - nothing - see 4  5
above

7)What was the impact on your technical staff to prepare for
deployment?

a. Nearly nothing - see 4, 5,  6 above

8)How well does it scale?

a. As well as CCA scales which is why we are considering moving from
CCA for all our nac

9) How are the management tools and maintenance for the solution?

 

 

 

Thank a million,

 

 

 

John V. Duran
University of New Mexico
Network Engineer

ITS/Network Communications/Data Services
Ph: (505) 249-7890
Fax: (505) 277-8101

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless Router Policy

2008-09-05 Thread Scholz, Greg
I misspoke the first time. We did not find it in syslog. At this time we
can't determine if it is in syslog or the web manager's event log but we
stumbled on it in the CAS logs. You would think that since Strict layer
2 is a configurable feature one should be able to view whether or not
it is happening in reasonably accessible logs. Thanks Cisco.

You can find it on each CAS: go to cd /perfigo/logs  directory then
look at perfigo-redirect-log0.log.0 file
At this point if you grep for NAT you'll see the following entries ..
Ex; [EMAIL PROTECTED] logs]#  grep NAT perfigo-redirect-log0.log.0

 
Example:
Aug 31, 2008 8:52:09 AM com.perfigo.wlan.web.Util logEvent
SEVERE: Possible NAT/Router in path User IP 158.65.scrubbed, User Name
scrubbed, Router MAC 00:17:3F:F3:37:81, User MAC
00:14:A5:AE:74:E6,00:16:D4:0E:83:65

Hope it helps,
Greg



-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Walt Howd
Sent: Friday, September 05, 2008 10:04 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wireless Router Policy

Greg - Can you detail where this information is stored on CCA layer 2  
mismatches? Can you access it via the CAM's web interface in the  
Event logs section, or do you need to be logging to an external  
syslog server? Thanks.

Walt

On Sep 5, 2008, at 8:35 AM, Scholz, Greg wrote:

 CCA has had some level of NAT restriction and what they call strict  
 L2
 whereby the server checks the MAC in the header of the users
 authentication/assessment packet against the MAC reported by the CCA
 client written in the payload of the authentication packet.

 If the MAC of the header is different than the MAC in the payload it  
 is
 restricted from getting on. There are 2 problems with this.
 1) many consumer grade routers/wireless units clone the first mac/ip
 that go through it so the unauthorized device looks just like the
 computer and it is allowed through.
 2) when it does clone that first device and they work fine, what  
 happens
 to the unsuspecting next door neighbor who's wireless card finds the
 offenders router and attempts to go through it?

 Even though it is imperfect we are still using this feature and  
 finding
 mixed results. Most importantly though the syslogs (not the gui  
 logs) do
 show when the event occurs with a fairly detailed entry of what the
 packet looked like (e.g. header mac and all client reported macs) so  
 we
 can find them on the network.

 Greg


 -Original Message-
 From: The EDUCAUSE Wireless Issues Constituent Group Listserv
 [mailto:[EMAIL PROTECTED] On Behalf Of Mark Berman
 Sent: Friday, September 05, 2008 7:58 AM
 To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
 Subject: Re: [WIRELESS-LAN] Wireless Router Policy

 This is basically our position as well. The prohibition is in our
 Computing
 Ethics and Responsibilities policy, which, along with the Privacy
 Policy
 constitute our AUP. The wording is in the section on tampering and  
 says:


 You may not modify residential computing network services or wiring  
 or
 extend those beyond the area of their intended use. This applies to  
 all
 network wiring, hardware, and cluster and in-room jacks. Gateways and
 firewalls designed for home use, such as Cable/DSL routers and  
 Wireless
 Access Points, can disrupt the normal operation of the Williams  
 network
 and
 are not allowed.

 A recent upgrade of our Impulse Point policy enforcement appliance  
 gave
 us
 the ability to locate and automatically shut down NAT gateways and  
 we're
 about to turn that function on.

 - Mark
 --
 Mark Berman, Director for Networks  Systems
 Williams College, Office for Information Technology
 *** Please consider the environment before printing this message




 -Original Message-
 From: Tony Fellows [mailto:[EMAIL PROTECTED]
 Sent: Thursday, September 04, 2008 10:58 AM
 Subject: Re: Wireless Router Policy

 Hi,

 I picked up on this issue because some years ago, I too had a problem
 with our small university college and the reluctance of management to
 prohibit rogue device connectivity to the central network. So rather
 than create a new policy I modified the AUP (acceptable Use Policy) -
 which every student and staff member signs up to (electronically) each
 new academic year.  I submitted clauses in the policy banning any
 device from being connected to the central network - which isn't the
 property of the university - which hasn't been vetted for use - or
 which is deemed unsuitable by IT Services staff.   It is pointed out
 that disciplinary action will be taken if any device is found to be
 illegally connected.
 To support these clauses - the security and integrity of the network
 was the main mission.  To manage data traffic and ensure a level of
 bandwidth throttling  which is sustainable for all users and services.

 I think a previous contributor from Georgia State - Charles - was spot
 on when he implied that without

RE: [WIRELESS-LAN] Roque AP's

2008-08-25 Thread Scholz, Greg
Any idea if these types of devices may allow computers to connect to
them as ad-hocs? In effect black-holing them?

 

_

Thank you,

Gregory R. Scholz

Director of Telecommunications

Information Technology Group

Keene State College

(603)358-2070

 

--Lead, follow, or get out of the way. 

(author unknown)

 

 

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Lee H Badman
Sent: Monday, August 25, 2008 10:55 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Roque AP's

 

Just that they show up overpowered, all over the place for channels...

 

Lee H. Badman

Wireless/Network Engineer

Information Technology and Services

Syracuse University

315 443-3003



From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Chris Murphy
Sent: Monday, August 25, 2008 10:42 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Roque AP's

 

Is there some particular issue you have with devices like the Airport?
Given it's 802.11 based and doesn't need to run in AP mode when used to
stream audio, is there some other problem you're seeing?

-Chris Murphy


On 8/25/08 8:40 AM, Peter P Morrissey [EMAIL PROTECTED] wrote:

Thanks Mike. We have SafeConnect. The difference is we allow wired
routers to make games, Tivo's, Clingboxes easier. I know SafeConnect
does a pretty good job ID'ng a lot of the games, but how do you deal
with Tivo's, Slingboxes, IP Phones etc?
 
The other challenge we're having is that we are seeing wireless devices
that don't use the wired Ethernet. Today we had someone with an AirPort
using them strictly for their wireless speakers.
 
Pete Morrissey
 



From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Mike Binns
Sent: Monday, August 25, 2008 8:24 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Roque AP's

Our NAC system, Impulse SafeConnect, detects rogue AP's by using what
they call NAT Detection. If the gateway of the students computer does
not match the gateway of the network, their IP (external one of the
rogue router/AP) gets blocked with a message stating the following:
=
You are connected to the network through an unapproved device
 
To connect to the Gordon college network, you must plug directly into
the network through the port in your room, or be connected to the
official campus wireless network.
The official Gordon wireless networks include:

=
The students see this message, and learn that the devices are not
allowed (and don't work), they then unplug them, getting rid of the
rogue wireless signal.
 
This has eliminated not only wireless rogues, but wired routers (which
we also prohibit).
 
-Mike
 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Peter P
Morrissey
Sent: Saturday, August 23, 2008 8:11 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Roque AP's

Has anyone had any success dealing with Rogue AP's?
Is anyone else seeing a lot of them this year?
We have 100% coverage in the dorms, and advertise this. We also
constantly tell people not to put up rogues, but it is very challenging
to control the rogues in our dorms.
 
Pete Morrissey
Syracuse University
** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 
** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. ** Participation and
subscription information for this EDUCAUSE Constituent Group discussion
list can be found at http://www.educause.edu/groups/.

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. ** Participation and
subscription information for this EDUCAUSE Constituent Group discussion
list can be found at http://www.educause.edu/groups/.


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Roque AP's

2008-08-24 Thread Scholz, Greg
We have seen the problem as well and don't have a definitive answer.
However, we are a Meru/Foundry wireless shop and there is built in rouge
detection/mitigation and are in discussion on implementing. I think most
controller based solutions have features/options like this. and there
are 3rd party platforms designed specifically for it.

 

I don't think any of the solutions are fully mature yet so you probably
have to come up with a creative combination solution NAC/network port
security/wireless rouge detection/etc

 

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Peter P
Morrissey
Sent: Saturday, August 23, 2008 8:11 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Roque AP's

 

Has anyone had any success dealing with Rogue AP's?

Is anyone else seeing a lot of them this year?

We have 100% coverage in the dorms, and advertise this. We also
constantly tell people not to put up rogues, but it is very challenging
to control the rogues in our dorms.

 

Pete Morrissey

Syracuse University

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Logging into a Active Directory domain via wireless 802.1x

2008-07-21 Thread Scholz, Greg
If the machine is domained and you check the box Authenticate as
computer when computer information is available in the SSID setup under
the Authentication tab then on boot up the computer account will be
used to log in providing you allow it in your radius config. Our radius
is a Microsoft IAS box that is a member of the domain and I specifically
allow DOMAIN\Domain users and DOMAIN\Domain Computers and it works
great.

 

You can watch at boot up an IAS event log entry for the computer logging
in and then after a user logs in there is a new entry from that same
client machine for the specific user.

 

Hope it helps.

Greg

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Youngquist,
Jason R.
Sent: Monday, July 21, 2008 2:10 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Logging into a Active Directory domain via
wireless  802.1x

 

We have several kiosk computers setup in our Student Commons area, and
they are accessing the Internet wirelessly.  What I'd like to be able to
do is join the computers to a domain and then have the students login
with their Active Directory credentials.  We will also be configuring
the computers to use 802.1x over wireless.  From what I've googled,
wireless doesn't appear to be setup until a person logs into the
computer.  

 

Is there any way to accomplish this?

 

Thanks.

Jason Youngquist

Network Engineer - Security

Technology Services

Columbia College

1001 Rogers Street, Columbia, MO  65216

(573) 875-7334

[EMAIL PROTECTED]

http://www.ccis.edu

 

 

 

 

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] NAT in large scale wireless networks

2008-07-03 Thread Scholz, Greg
Stan,
Can you tell me what type of location information you get and from what
log? 802.1x/WPA-Enterprise, so we have usernames and locations in our
logs

We are trying to figure out if there is a way to determine what APs user
are/have been on but all we have seen in the radius logs is the
controller as the NAS.


Thanks,
Greg



-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Brooks, Stan
Sent: Wednesday, July 02, 2008 6:34 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] NAT in large scale wireless networks

Mike,

We, too, are an Aruba shop, and have been doing NAT on our academic and
ResNet wireless networks for about a year now.  Two years ago, we ran
out of IP addresses on our wireless network on Move-In Weekend and had
to scramble to add additional subnets - a scarce commodity here at
Emory.  To prevent that from happening last year, we implemented NAT for
our wireless clients and now have plenty of address space for our
growing user base.

We let the Aruba controllers perform the NAT function (very easy to set
up - just a firewall rule in the user role in the Aruba config). We've
not had any complaints from users regarding NAT issues; we were
concerned that it might break some apps, but no problems have been
observed or reported.  We've even got our homegrown NAC (NetReg/CAT)
working over the wireless, too - NetReg DHCP traffic is not NAT'ed, but
all other traffic is.  This all works great, thanks to the Aruba
capabilities.

The only issue we've had with NAT have been voiced by Philippe - DCMA
notices are hard to isolate.  Our wired network has some protection in
place to identify and reduce peer-to-peer traffic (Tipping Points), so
we don't generally get a lot of notices.  User tracking and RF location
still works well as those are functions of the radio and authentication
subsystems.  Our academic users log on using 802.1x/WPA-Enterprise, so
we have usernames and locations in our logs.  Connecting those usernames
to the NAT pool IP addresses is the hard part.

I'd be happy to share some basic configuration tips and tricks regarding
NAT with you off-list, or on-list if other s are interested.

BTW - We've been NAT'ing our guest access users since day one on the
Aruba equipment.  Guests log in through the captive portal and are
given limited access - bandwidth limited web access and VPN access back
to their home organizations.

 - Stan Brooks - CWNA/CWSP
  Emory University
  Network Communications Division
  404.727.0226
AIM/Y!/Twitter: WLANstan
   MSN: [EMAIL PROTECTED]
GoogleTalk: [EMAIL PROTECTED]

-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Michael Dickson
Sent: Tuesday, July 01, 2008 9:47 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] NAT in large scale wireless networks

Though we currently have enough available routed IP space for our
wireless clients we are looking toward the future and wondering if
NAT-ing the wireless network makes sense.

Does anyone have any experiences, good or bad, using NAT for the
wireless client pool in a large scale environment? What features go
away (i.e. RFID or user tracking, etc.) Are there any gotchas?

We're an Aruba shop and expect about 3000+ wireless clients this
semester and have been adding more APs by the week.

Thanks,
  Mike

***
Michael Dickson Phone: 413-545-9639
Network Analyst [EMAIL PROTECTED]
University of Massachusetts
Network Systems and Services
***

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

This e-mail message (including any attachments) is for the sole use of
the intended recipient(s) and may contain confidential and privileged
information.  If the reader of this message is not the intended
recipient, you are hereby notified that any dissemination, distribution
or copying of this message (including any attachments) is strictly
prohibited.

If you have received this message in error, please contact
the sender by reply e-mail message and destroy all copies of the
original message (including attachments).

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] User Tracking with IAS

2008-06-24 Thread Scholz, Greg
Sorry, no experience with any of them yet but I recently stumbled on
some options when I was troubleshooting IAS.

Just google IAS log file format or IAS logging. You get some technet
articles but also other solutions for parsing/reporting from the IAS
logs.

 

 

Thanks,
Greg

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Urrea, Nick
Sent: Tuesday, June 24, 2008 2:11 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] User Tracking with IAS

 

I am looking for a solution to perform user tracking using an IAS
server.

We will be rolling out WPA2/802.1x this summer and I would like to do
user tracking.

I would like to poll all the user logins/logoffs into a
database/application.

Any ideas of software/solutions?  

 



Nicholas Urrea

Information Technology 

UC Hastings College of the Law

[EMAIL PROTECTED]

x4718

 

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wireless authentication for guests/visitors - something along the lines of hotel gatekeeper?

2008-06-05 Thread Scholz, Greg
A response like this may spur a flurry of disagreement but here goes...
We blocked all P2P apps using all available technology last year and
have not received a single DMCA notice since (knock on wood).
We blocked using our checkpoint firewall and packeteer packet shaper in
both directions.

So...in your case, even if you can't or won't block carte blanche like
this I suggest somehow setting up a ssid/vlan/security profile or
whatever for these types of users and do not let them do anything except
minimal connectivity to the web. (e.g. http, https, dns, IPSec)

Due to CALEA and other related mandates I think (i.e. in my opinion) the
trend even on campuses is going toward anonymous guest access either
being non-existent or having minimal allowed services and sponsored or
authenticated guest access being used for cases where people need/want
more access.


And along with our block we highly prompted our exception policy that
allows exceptions for just about any justified activity...we got TWO
requests and both of which found other ways to get what they needed
before we had their exception in place.


_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070

--Lead, follow, or get out of the way. 
   (author unknown)




-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Chuck Braden
Sent: Thursday, June 05, 2008 1:45 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Wireless authentication for guests/visitors -
something along the lines of hotel gatekeeper?

First, let me apologize for my naivete.  I had planned to subscribe and
lurk a bit to come up to speed but my exposure requires I move a little
faster.  

We recently have heard from the RIAA regarding copyrighted content at
one of our conference centers. These centers are used for short periods
by customers who are there for training. They generally bring their own
resources which might have various peer-to-peer clients and the
associated content.  Theses customers are not required to 'register' or
authenticate. They are given the key to our wireless SSID and allowed to
access the network.  The more rapid response of the copyright
enforcement organizations to identify content has necessitated the need
for some type of authentication/registration for these connections.  Can
someone offer some suggestions on how best to manage these connections?


If that involves purchasing a specific wireless router to direct the
session to at the time of the IP being issued please indicate which
vendors or models those are.   It would be nice to have a open source
solution that could be installed on a PC and do monitoring for the
traffic but that is not a high priority. 

We really dont need to block it (because it could be authorized). Only
make sure we can identify where the content resides and determine a
proper response. 

Anything you could offer would put me in a better position than I am now
- thanks. 

Jimmy C Braden
Information Security Officer
Extension Information Technology
Texas AgriLife Extension Service
979-862-7254
[EMAIL PROTECTED] 

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] PDA 802.1x WPA2 or WPA

2008-05-30 Thread Scholz, Greg
Based on your description it sounds like a server config issue not a
client issue. (we are currently dealing with EAP/802.1x configuration as
well). Your event log entry  the Extensible Authentication Protocol
(EAP) Type
cannot be processed by the server indicates it is getting an EAP
request, just not of a type you have setup on the server.

I am unfamiliar with 2008 policy server but in 2003 IAS you need to
click EAP Types and ensure you have EAP configured right and to use a
WLan type certificate.

Does your config work for EAP for any clients right now?


_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070

--Lead, follow, or get out of the way. 
   (author unknown)




-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Daniel Bennett
Sent: Friday, May 30, 2008 12:04 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] PDA 802.1x WPA2 or WPA

The Odyssey Client worked great!  Does anyone have a reseller they use
for this?  The list price is $50 per license but I am hoping to get
better prices being education.


Daniel R. Bennett
CompTIA Security+
Information Technology Security Analyst
Pennsylvania College of Technology
One College Ave
Williamsport, PA 17701
(P) 570.329.4989


-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Jason Appah
Sent: Friday, May 30, 2008 11:24 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] PDA 802.1x WPA2 or WPA

I have only used it as a part of windows mobile 5 on Intermec scanners
and touch screen devices, so I admit, I've only used it as a
pre-installation.

-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Lee H Badman
Sent: Friday, May 30, 2008 8:09 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] PDA 802.1x WPA2 or WPA

I have found Odyssey to be great on iPAQs and such that had it packaged
as part of the original software build that shipped with the device, but
less than 50% effective/reliable as an add-on to other hand-helds.

-Lee


-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Jason Appah
Sent: Friday, May 30, 2008 11:05 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] PDA 802.1x WPA2 or WPA

Most Windows Mobile 6 devices do WPA2 and 802.1x but a better client to
use would be Funk, (now juniper) odyssey client...

http://www.juniper.net/products_and_services/aaa_and_802_1x/odyssey/inde
x.html


-Original Message-
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Daniel Bennett
Sent: Friday, May 30, 2008 7:57 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] PDA 802.1x WPA2 or WPA

Does anyone know a thirdy party piece of software that will allow me to
connect Windows Mobile 5 or 6 to our WPA2 with 802.1x using PEAP
wireless network?  We don't use personal certificates for
authentication, only a username and password.  We are using Windows 2008
Network Policy Servers as our radius server.  Below is an event log
entry.  We can get the PDA connected, it transmits the username and
password but the EAP isn't working.  I have tried enabling all EAP
protocols and all encryption options and I still get the EAP error
below.  Any help?


Network Policy Server denied access to a user.

Contact the Network Policy Server administrator for more information.

User:
Security ID:xx\xx
Account Name:   xx\xx
Account Domain: xx
Fully Qualified Account Name:   xx\xx

Client Machine:
Security ID:NULL SID
Account Name:   -
Fully Qualified Account Name:   -
OS-Version: -
Called Station Identifier:  00-18-74-F8-4D-F0:ssid
Calling Station Identifier: 00-1A-6B-93-62-ED

NAS:
NAS IPv4 Address:   10.x.x.x
NAS IPv6 Address:   -
NAS Identifier: WiSM-B
NAS Port-Type:  Wireless - IEEE 802.11
NAS Port:   29

RADIUS Client:
Client Friendly Name:   WiSM2
Client IP Address:  10.x.x.x

Authentication Details:
Proxy Policy Name:  Authenticate pct.edu Users
Network Policy Name:Employee Wireless Policy
Authentication Provider:Windows
Authentication Server:  NPS2.pct.edu
Authentication Type:EAP
EAP Type:   -
Account Session Identifier:

RE: [WIRELESS-LAN] Adding wireless without losing the jacks?

2008-01-02 Thread Scholz, Greg
We also have a per jack funding model and I had the same concern as
wireless was being requested more and more. We wrote a procedure for how
to obtain wireless for you area and coupled a charge to it.

We specifically state that wireless is not supported on our campus as a
replacement to standard office wired jacks.

Entire charge back model:
http://www.keene.edu/it/networksvs/chargeback.cfm

Wireless:
http://www.keene.edu/it/networksvs/wirelessbilling.cfm

I personally believe that a wireless network can be built to replace the
wired jacks. However, it would be bigger and much more complicated than
anything we are willing and able to undertake at this time. That being
said if you already have a substantially secure and robust wireless
network (and a great billing system) maybe it is time to consider
charging per connected device rather than the actual jack.

_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070
 
--Lead, follow, or get out of the way. 
(author unknown)
 -Original Message-
From: Michael Dickson [mailto:[EMAIL PROTECTED] 
Sent: Thursday, December 27, 2007 1:24 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Adding wireless without losing the jacks?

Wondering if others face a similar situation and what they are doing 
about it. In short, what is *wireless* used for and what is *wired* used

for and how are the intended uses enforced?

We currently have a funding model that includes a per-jack monthly 
charge for wired users. As we add wireless coverage to these 
traditionally wired floors we are faced with the potential of canceled

jacks and a migration to wireless. If other schools have a similar 
funding model, how have you dealt with this issue?

How are other schools dealing with a wireless overlay in traditionally 
fully wired areas with respect to migration onto wireless? Is migration 
away from the jacks desired? Is it suppressed through policy 
restrictions? What has worked for ensuring the wired infrastructure is 
still used? Just saying stay on the jack for better performance and 
security doesn't appear to be enough.

In IT we often discuss the need to upgrade older Cat3 jacks to the 
newest cabling, as well as install wireless coverage in the same areas. 
These two efforts seem at odds with each other and appears financially 
risky to management. How are schools achieving harmony in a mixed 
wired/wireless world?

Thanks,
  Mike

---
Michael Dickson
Network Analyst
University of Massachusetts Amherst
Network Systems and Services
[EMAIL PROTECTED]

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Controlling Encrypted p2p

2007-10-23 Thread Scholz, Greg
We use our shaper and firewall to block any P2P protocols that they can
determine. So the encrypted P2P problem tends to not be that it can't be
seen at all, just that the data channel is encrypted - block the session
channel and the data channel will never be established - kind of like
the data channel on FTP.

If you try to regulate it you will slow down session creation but once
the sessions are created they will have ample bandwidth that is not
controllable...at least that is what we determined prior to blocking
altogether.

_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070
 
--Lead, follow, or get out of the way. 
(author unknown)
 -Original Message-
From: George Rogato [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 23, 2007 3:18 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Controlling Encrypted p2p

How is everyone controlling encrypted p2p traffic?

Thanks

George

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Wifi Location based Access Control

2007-10-09 Thread Scholz, Greg
We recently started deploying Foundry Network wireless solution which is
an OEM Meru.  The product is called Location Manager and it is supposed
to do exactly what you are asking.  Ironically though I think the
Location Manager piece was originally Foundry's for their thick AP
models and OEMed it back to Meru for their thin APs.  Currently Location
Manager for Mobility Series (Foundry/Meru thin APs) is in Beta and is
definitely still a Beta.  It shows promise though.

 

 

 

_

Thank you,

Gregory R. Scholz

Director of Telecommunications

Information Technology Group

Keene State College

(603)358-2070

 

--Lead, follow, or get out of the way. 

(author unknown)

 



From: Jamie Savage [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 09, 2007 2:31 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Wifi Location based Access Control

 


I recently sat through a Meru presentation where they discussed the fact
that they could do this.   I believe it works by comparing triangulated
client locations to your CAD floorplans.you might want to check
with them.   However, it sounds like you're not looking to replace all
of your wireless infrastructure  (ie.I think you'd need to use all
Meru hardware to use this solution) 

J 

James Savage   York University

Senior Communications Tech.   108 Steacie Building
[EMAIL PROTECTED]4700 Keele Street
ph: 416-736-2100 ext. 22605Toronto, Ontario
fax: 416-736-5701M3J 1P3, CANADA 



Urrea, Nick [EMAIL PROTECTED] 

10/09/2007 02:07 PM 

Please respond to
The EDUCAUSE Wireless Issues Constituent Group Listserv
WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU

To

WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU 

cc

 

Subject

[WIRELESS-LAN] Wifi Location based Access Control

 

 

 




We at UC Hastings are looking for a solution to create physicall
boundries inside our wifi network. 
We would like to shut out the Students from using our wifi network in
our classrooms but not in study areas. 
Our buildings are located in downtown SF and have study areas located
next to classrooms 
NewBerryNetworks has a product that does wifi location based Access
Control. 
If a client is found to be located in an area that we don't want the
client to have access to the wifi network the client is blocked at the
proxy or 
Authentication firewall. 
Does anybody know of any solutions besides NewberryNetworks for locking
students out of classrooms that doesn't involve scheduling? 
We have already looked at a scheduling solutions to deny access.   
  
  
 
Nicholas Urrea 
IT Support Specialist 
UC Hastings College of the Law 
[EMAIL PROTECTED] 
x4718 
  
  

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/. 

** Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/.


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Rogue DHCP on wireless network

2007-08-30 Thread Scholz, Greg
Should be easily accomplished by putting filters (ACLs) on the APs
themselves. I know in the aironet 350 days this was possible. Block
bootpserver inbound on the radio side. In fact while you're at it you
may as well block bootpclient outbound on the radio side so that your
legitimate bootpclient broadcasts don't go out the radio saving a little
bandwidth.



_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070
 
--Lead, follow, or get out of the way. 
(author unknown)
 

-Original Message-
From: Fred Archibald [mailto:[EMAIL PROTECTED] 
Sent: Thursday, August 30, 2007 11:46 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Rogue DHCP on wireless network

Ryan,
In our Cisco/Airespace environment, on each WLAN, we set the DHCP 
address assignment to required.  This forces the controller to only 
allow traffic to be forwarded for clients that obtained their DHCP lease

from a DHCP server that is behind the controller on our wired 
infrastructure. This feature has worked very well for us in EECS. I 
believe this will work for you.
Fred

Ryan Lininger wrote:
 I have been having some issues recently with DHCP on the wireless 
 network.  It really has been misconfigured laptops running internet 
 connection sharing so far (notion malicious) but we have been 
 experiencing outages because of it.  We are a Cisco Switched 
 environment but our wireless network is a Cisco and 5G network with a 
 bluesocket captive portal.  I have DHCP snooping running on all the 
 switches in our environment that can run it but that is the only way 
 that I have been able to battle this issue.  Everything else is 
 manually hunt done the culprit and meet with them to fix their
machine.

 I would like to know how others have been battling the problem of 
 rogue systems serving DHCP on their wireless network?  I wouldn't mind

 hearing how people have battled this problem on the wired network 
 either (these solutions may port over).

 Any help is appreciated.

 Ryan.


**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] ARP floods with Cisco APs - could this be the bug?

2007-07-24 Thread Scholz, Greg
According to the network world article they run both.

Most of the W LAN is comprised of Cisco thin access points and
controllers. Some older autonomous Cisco Aironet access points tend to
uncover the flooding first, since they try to resolve the ARP request
themselves.

http://www.networkworld.com/news/2007/071607-duke-iphone.html?page=2


_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070
 
--Lead, follow, or get out of the way. 
(author unknown)
 -Original Message-
From: Michael Kaegler [mailto:[EMAIL PROTECTED] 
Sent: Monday, July 23, 2007 3:30 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] ARP floods with Cisco APs - could this be
the bug?

At 1:00 PM -0500 7/23/07, Frank Bulk wrote:
Joe:
No, I don't think so, as this relates to the IOS versions of Cisco's 
product, and it's my understanding that Duke uses the LWAPP 
configuration.

At 5:35 PM -0400 7/13/07, Kevin Miller wrote:
For the last week or so, we have seen some unusual problems with our
autonomous (cisco) APs.

According to Duke, Duke runs autonomous cisco APs.
I haven't seen anyone with a Cisco BugID, and some quick toolkit 
surfing doesn't raise any suspects, which means they're probably 
keeping it under wraps.

Kevin's sure been...quiet. poke, poke :)
-porkchop

-- 
Michael Porkchop Kaegler, Sr. Network Analyst
(845) 575-3061 Marist College, Poughkeepsie, NY

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Wireless only dorms

2007-04-16 Thread Scholz, Greg
Some pointed questions stemming from recent list serve discussions. 

 

*   Do you have any residence halls where you do not provide wired
network and have only wireless networking for residents?
*   If so, how many?
*   How many students per building?
*   Why did you choose this?

 

*   ANY gotcha's you can think of or support issues you ran up
against? (e.g. where do I plug in my game box?)

 

 

We are leaning toward making an existing residence hall wireless only.
The wire is cost prohibitive to replace in this particular facility.

9 building complex, 50 students per building, wood construction, 3
floors per building.

 

 

_

Thank you,

Gregory R. Scholz

Director of Telecommunications

Information Technology Group

Keene State College

(603)358-2070

 

--Lead, follow, or get out of the way. 

(author unknown)

 

 


**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] microcell vs virtual cell

2007-04-06 Thread Scholz, Greg
I am also interested in anything you find.


-Original Message-
From: Steve Fletty [mailto:[EMAIL PROTECTED] 
Sent: Friday, April 06, 2007 3:33 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] microcell vs virtual cell

Is there any scholarly or technical data/analyis of the single-channel 
virtual cell architecture vs the traditional micro-cell WIFI
achitecture?

I don't want to hear from vendors. I don't want bake-off results or 
vendor white papers. I'd like to know if there's any hard science 
comparing the two contrasting schemes.

--
Steve Fletty
Network Design Engineer
University of Minnesota

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Highrise dorm RF design

2007-03-27 Thread Scholz, Greg
For such a large deployment I would be putting pressure on a manufacture
AND reseller to give a guaranteed design. 

You also may find slightly (or substantially) different designs
depending on manufacturer as well. You did not mention if you have a
preferred manufacture yet.

 _
Thank you,
Gregory R. Scholz
Lead Network Engineer
Information Technology Group
Keene State College
(603)358-2070
 
--Seek first to understand, and then to be understood. 
(Steven Covey)
 
-Original Message-
From: Karl Reuss [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, March 27, 2007 9:53 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Highrise dorm RF design

We're getting ready to expand our campus wireless
coverage into the dorms; full coverage for 12,000 students
over the next year.  The recent dorm discussions here have
been very helpful.

I'm wondering if anyone has experience with dense
AP deployments in traditional high-rise dorms.  About half
of our students live in these monsters.  8 floors, 250' straight
hallway down the middle of each, rooms on either side, block
walls, 70 users per floor.  Sort of like prison cells:)  Our
field guys and residential facilities folks would rather not
put the APs in student rooms, which basically just leaves the
hallways.  I'm worried about co-channel interference on the b/g
side.  6 or 7 APs down a hallway in clear sight of each other
will surely step on each other.  Loss through the floors only
seems to be 10db, which means we need to watch the vertical as
well.  Dropping power would only help a little, and at the
expense of room penetration.  External patch antennas are
one idea were looking at.  If anyone has any experience or
advice in this area they could share, I would be grateful!

Thanks,
-Karl Reuss
  University of Maryland, College Park

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] What about WLAN in the Dorms?

2007-03-17 Thread Scholz, Greg
I was about to say the same.  It is an easy out to state only approved
devices area allowed to be connected to the network and exclude any
type of routing/switching/network device and/or any type of multi-homed
device.
http://www.keene.edu/it/security/connect.cfm


 _
Thank you,
Gregory R. Scholz
Lead Network Engineer
Information Technology Group
Keene State College
(603)358-2070
 
--Seek first to understand, and then to be understood. 
(Steven Covey)
 
-Original Message-
From: Cal Frye [mailto:[EMAIL PROTECTED] 
Sent: Saturday, March 17, 2007 9:45 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] What about WLAN in the Dorms?

Frank Bulk wrote:
 Charles:
 
 You brought up OTARD, so I can help but ask: what was the line of
reasoning
 your legal office followed to come up with the policy that you
reserve the
 right to limit the use of non-wireless Andrew 2.4 GHz devices?
 
Of course, not too many of these devices are useful if they can't be
plugged in or connected to our network or phone lines, and we do
restrict what appliances can be used in the residence halls.

-- 
Regards,
-- Cal Frye, Network Administrator, Oberlin College

   www.calfrye.com,  www.pitalabs.com

Sell not virtue to purchase wealth, nor Liberty to purchase power. --
Benjamin Franklin.

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] wireless guest access

2007-02-26 Thread Scholz, Greg
Very timely. I am about to launch a project called public port security
and guest access that will attempt to define exactly this. I would like
to hear all other responses as well. (I suggest if you are considering
Wireless guests, you should be considering wired as well)

*   Currently we have NO guest access on wireless.
*   We recently changed all our public lab computers to use AD
authentication (e.g. no more public/guest access)
*   We use CCA in reshalls and enable the guest button JUST FOR THE
SUMMER (for all the conferences/camps we have during that time) so
effectively no guest access except for summer
*   The ONLY real guest access we have right now is any network port
in a publicly accessible location can be used by anyone without any type
of check. (These are the public ports referred to in my project title
above). INCLUDING if someone unplugs a lab/office/kiosk computer and
plugs in their own.
*   We will attempt to balance the tremendous desire for wireless 
wired guest access, CALEA, security and manageability.

I am thinking we may wind up with a 1x solution to determine appropriate
port settings (security/vlan/etc) based on recognition of user,
computer, or both and then computer health for non-campus managed
computers.


_
Thank you,
Gregory R. Scholz
Director of Telecommunications
Information Technology Group
Keene State College
(603)358-2070
 
--Lead, follow, or get out of the way. 
(author unknown)
 

-Original Message-
From: Lee Badman [mailto:[EMAIL PROTECTED] 
Sent: Monday, February 26, 2007 1:04 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] wireless guest access

Would like to expand out Kevin's question- what of wireless access for
guests, and for the non-affiliated folks (anonymous) that might end up
on campus? 

Anybody rethinking any of their sponsored guest/open access policies
because of CALEA concerns?

Regards-



Lee Badman
Network/Wireless Engineer
Syracuse University
315 443-3003

 Kevin Lanning [EMAIL PROTECTED] 2/26/2007 12:46:48 PM 
Wondering what academic institutions are doing these days regarding 
wireless access for guests?
-- 
--
Kevin Lanning
lanning at unc.edu

**
Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] SSIDs: broadcast and non-broadcast

2006-07-10 Thread Scholz, Greg
In order to keep things simple I usually try to favor educating users on
the automatic built in kind of utilities (WZC) rather than having to
teach them how to shut off the built in stuff and then dabble in the
plethora of 3rd party versions available.  But the problem in this case
is that in my experience MS's utility is far inferior.  Also, almost all
laptops come with their own wireless utility that, although different
from every vendor, works generally the same and allows selecting of
exactly what the user wants VERY consistently (once the hidden SSID is
manually configured). (i.e. the 3rd party one tends to do what you want)

So this is one scenario where support may actually be easier by
suggesting/pushing that the users use whatever utility is specific to
their card rather than trying to get everyone on the same one where you
can be an expert. Your support calls may be more varied, but they
should be fewer and easier.

My .02


_
Thank you,
Gregory R. Scholz
Lead Network Engineer
Information Technology Group
Keene State College
(603)358-2070
 
--Lead, follow, or get out of the way. 
(author unknown)
 
-Original Message-
From: Kevin Miller [mailto:[EMAIL PROTECTED] 
Sent: Monday, July 10, 2006 12:12 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] SSIDs: broadcast and non-broadcast

 From observations and discussion with others, it seems that that 
wireless zero config on windows favors broadcast SSIDs... You may notice

that sporadically it will connect to the broadcast one even if you've 
configured the non-broadcast with higher priority.

-Kevin

Jim Gogan wrote:
 Quick question: has anyone run into any support issues when some SSIDs

 are broadcast and some aren't on a campus?
 
 -- Jim Gogan
ITS Telecommunications
University of North Carolina at Chapel Hill
 
 **
 Participation and subscription information for this EDUCAUSE
Constituent 
 Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] SSIDs: broadcast and non-broadcast

2006-07-10 Thread Scholz, Greg
Thanks all for clarifying.  I guess I was remembering back to when Cisco
first came out with multiple vlan/ssid pairs.  And our currently
installed Proxim/Orinoco APs allow multiple vlan/ssid pairs but only one
can be set to broadcast.  Since it sounds like now almost everyone can
do multiple vlan/ssid pairs AND broadcast for all of them, I will be
looking at that as a feature at our upcoming upgrade.


_
Thanks,
Greg
8-2070 

-Original Message-
From: Frank Bulk [mailto:[EMAIL PROTECTED] 
Sent: Monday, July 10, 2006 4:25 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] SSIDs: broadcast and non-broadcast

Thanks, Stan, for clarifying.  

Perhaps I presume, too quickly, that most schools use enterprise-class
APs
or switch/controller-based systems where such functionality and support
for
multiple BSSIDs are standard. =)

Depending on the system, there is always support for a 1:1 mapping of
SSIDs
to VLANs, but most support a 1 to many and many to 1 mapping, too,
although
it can be less than straight-forward.

Regards,

Frank

-Original Message-
From: Stan Brooks [mailto:[EMAIL PROTECTED] 
Sent: Monday, July 10, 2006 2:35 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] SSIDs: broadcast and non-broadcast

Greg,

What Frank was alluding to was the ability of some APs and most WLAN 
switch/controller-based systems to support multiple SSIDs - also called 
Virtual WLANs.  To get consistent and acceptable client connectivity, 
the APs/WLAN controllers should support unique BSSIDs (wireless MAC 
addresses) for each SSID.

At Emory, we are using Aruba equipment quite successfully to present 
multiple SSIDs for guest access and WPA/WPA2.  Each SSID gets mapped to 
a specific VLAN and has different authentication and access rights.

 - Stan Brooks - CWNA/CWSP
  Emory University
  Network Communications Division
  404.727.0226
  [EMAIL PROTECTED]
AIM: WLANstan  Yahoo!: WLANstan  MSN: [EMAIL PROTECTED]


 Original Message 
From: Scholz, Greg
Date: 7/10/2006 3:15 PM

 I am surprised no one has brought up the issue of only being able to
 broadcast one SSID.  What do you do if you need/want more than one.
 
 We currently only have one and Franks comment makes sense in that
 scenario.  However, assuming that we can only broadcast one, how do
you
 differentiate wireless if needed?
 What I am hoping to achieve in the near future is 3 classes of service
 (Fac/Staff, Student, and guest). (note: we use CCA for reshalls here)
 Fac/staff can use their campus owned laptop and will be able to pass
 right over to a VPN to get into the network.  CCA can exempt devices
 we choose (e.g. campus run laptops)
 Students can use their same CCA credentials to log in and use the
 wireless in exactly the same manner as in the res halls. This will
give
 them a more consistent experience.
 Guests will only be able to click guest in CCA and get 80 (maybe 443
 and IPSec - do not know yet) out to the world.
 If a student selects the Fac/Staff SSID they would fail the login so
 could not go anywhere and the same is true if a Fac/Staff selects the
 student SSID.
 
 _
 Thanks,
 Greg
 358-2070 
 
 -Original Message-
 From: Frank Bulk [mailto:[EMAIL PROTECTED] 
 Sent: Monday, July 10, 2006 2:51 PM
 To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
 Subject: Re: [WIRELESS-LAN] SSIDs: broadcast and non-broadcast
 
 In an educational network where you're not try to leverage
(erroneously)
 the
 SSID as a security tool you might as well just broadcast the SSID and
 make
 life easier for all the mobile clients involved -- why not?
 
 Frank
 
 -Original Message-
 From: Jorge Bodden [mailto:[EMAIL PROTECTED] 
 Sent: Monday, July 10, 2006 8:22 AM
 To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
 Subject: Re: [WIRELESS-LAN] SSIDs: broadcast and non-broadcast
 
 Jim,
 
 Yes, I have run into one particular problem when an SSID is not 
 broadcast.  We call it a 'code 18, where the problem is 18 inches
away 
 from the monitor.  :-)
 
 I have found that it is quite difficult for people who do not have
some 
 experience with wireless, to set up their wireless devices when an
SSID 
 is not being broadcast.  You may be asking too much from the general 
 public to force their device to search for the SSID.
 
 If the SSID is going to be used by the general then you might want to 
 broadcast it, in order to minimize the calls to your helpdesk.
 
 Jorge
 
 Jim Gogan wrote:
 Quick question: has anyone run into any support issues when some
SSIDs
 
 are broadcast and some aren't on a campus?

 -- Jim Gogan
ITS Telecommunications
University of North Carolina at Chapel Hill

 **
 Participation and subscription information for this EDUCAUSE 
 Constituent Group discussion list can be found at 
 http://www.educause.edu/groups/.
 
 
 
 
 
 
 This electronic message is intended to be for the use only of the
named
 recipient, and may contain

RE: [WIRELESS-LAN] Theories on a massive problem on our WLAN?

2006-03-13 Thread Scholz, Greg
Not including crushing the regular Ethernet switches (3500's) I have
seen Cisco APs do some thing similar to what you are speculating.  This
was pre-IOS and Cisco confirmed what we saw but never fixed the issue
directly in the VxWorks because they claimed the IOS version would not
have it.  I left that job before we did this so I do not know the
result.

So with all that caveat, here is what we were 99.999% sure was
happening.  Each Cisco AP maintains a list of associations. The list
of associations includes clients as well as ALL APs in the same
broadcast domain.  I believe it has something to do with handoffs and
such or maybe just informational traffic, I am not sure.  In any case we
had 331 APs but only a small handful of clients.  The APs were getting
creamed by trying to keep track of 330 of their buddies as well as their
buddies client associations.  That was the major flaw.  Cisco said if we
HAD to we should split up the management vlan so there were not 331 in
the same broadcast domain but leave the client vlans alone.  We did this
as a short term fix.

To compound this, someone (not me) told us at that time Wavelink was the
only way to go for management.  We went with it to find the following
problem.  One of the things it did was to periodically (5-15 mins or so)
poll each access point to include it's association table.  Well, here
you go with 330 entries from each and every of the 330 APs in addition
to the APs config itself.

Needless to say both of these issues caused a bit of what I would say
was excessive management traffic.

I can not remember the protocol name but if you do a sniff where you can
see layer 2 management traffic between the APs it should be pretty
obvious. I would look to see if WLSE is doing some sort of unexpected
query of the APs that may cause a larger than reasonable response.

Hope this gets you somewhere.

_
Thank you,
Gregory R. Scholz
Lead Network Engineer
Information Technology Group
Keene State College
(603)358-2070

--Seek first to understand, and then to be understood. 
  (Steven Covey)


-Original Message-
From: Lee Badman [mailto:[EMAIL PROTECTED] 
Sent: Monday, March 13, 2006 12:48 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Theories on a massive problem on our WLAN?

Wondering if anyone in the group cares to hazard a theory.

Our Cisco WLAN has been quite stable for better than three years.
Currently running *180* 1130s, *120* 1200s, and a couple dozen 350s-
mostly IOS but a couple of legacy VxWorks that are hard to get to to
convert. We have the clasic DMZ/Captive portal thing going on, where a
home-built gateway head-ends each of our two major wireless spaces, with
an optional VPN box for each space. We do trunk specific VLANs around
for each space. WLSE manages it all, no WLSM, no forced client
encryption (other than voluntary VPN). IOS APs are current and all
within 2 minor revisions of each other, and have been cruising along
nicely for quite a while.

This past Saturday, very early in the morning, one of our wireless
spaces was creamed by some sort of broad-ranging, severe multicast
flood. Long story short- it seemed like the APs were chattering back and
forth to each other with huge, continuous, multicast streams that
overwhelmed many of the switches carrying the traffic. Once it started,
it seemed to be self-propogating. We had to put in some ACLs to break
things up, and in some cases reboot the switches. Cat 3500s seem to take
the worst of it, and a couple got corrupted to the point of becoming
doorstops.

Knowing that it's hard to see the whole picture from afar, wondering if
anyone has ever experienced anything like this? 

Thanks for playing the game.

Lee

Lee Badman
Network Engineer
CWNA, CWSP
Information Technology and Services
(Formerly Computing and Media Services)
Syracuse University
(315) 443-3003
[EMAIL PROTECTED]

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Problems with 802.1x with hidden SSID

2006-02-27 Thread Scholz, Greg
Please reply to list or include me as we would be very interested in
this also.
Thanks in advance!
_
Thank you,
Gregory R. Scholz
Lead Network Engineer
Information Technology Group
Keene State College
(603)358-2070

--Seek first to understand, and then to be understood. 
  (Steven Covey)


-Original Message-
From: Tom Zeller [mailto:[EMAIL PROTECTED] 
Sent: Monday, February 27, 2006 3:29 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Problems with 802.1x with hidden SSID

Our APs can only broadcast a single SSID (Proxim 600s and HP 420s).

To minimize disruption we're looking at running a new 802.1x wireless
network in parallel with the old VPN-protected network.

What we're seeing isn't so pretty.  Very unreliable getting a connection
with both Mac and PC though it works well once connected.

Using the same laptops with a test of broadcast SSID and they both
connected
reliably and much faster.

If anyone has any ideas that this can NEVER work, or that you are in
fact
doing this, I'd be interested in hearing about it.

Tom Zeller
Indiana University
[EMAIL PROTECTED]

812-855-6214

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] 802.1x- Who's doing it and how far along

2006-01-19 Thread Scholz, Greg
Please either respond to the list or include me in the results.

-we are not using 802.1x in any manner (wired or wireless)
-na
-na
-wireless was in place when I got here so I do not know if 1x was
considered.

We use bluesocket so basically we give the wireless connection for
free (to coin a phrase) but then require login to go anywhere, even our
own webserver.  We have it limited to 80 and 443 so we do not require
any encryption at this time.

Please no one respond to me about how bad it is to allow all that
traffic unencrypted. We only recently had a real mechanism for
authenticating students so will be having a real project to decide on a
wireless network architecture including security and authentication in
the near future.

Hope that was brief enough (brevity is a struggle for me :)

_
Thank you,
Gregory R. Scholz
Lead Network Engineer
Information Technology Group
Keene State College
(603)358-2070


-Original Message-
From: Lee Badman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, January 19, 2006 8:56 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] 802.1x- Who's doing it and how far along

Knowing that this can be a large topic, will try to keep the questions
simple for all:

- How many of you are using 802.1x as your primary production wireless
security mechanism?
- EAP type(s)?
- RADIUS type?
- Has anybody started down the 802.1x road, then bailed out with no
intention of going back to it? Why?


That's all! Trying to keep it brief for everyon'e sake while still
gathering what I need...

Regards-

Lee

Lee H. Badman
Network Engineer
CWSP, CWNA (CWNP011288)
Computing and Media Services (NSS)
250 Machinery Hall
Syracuse University
Syracuse, NY 13244
(315) 443-3003 Voice
(315) 443-1621 Fax

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] 802.1x- Who's doing it and how far along

2006-01-19 Thread Scholz, Greg
Cully,
Have you found any issue with certain client platforms not behaving
well? Any workarounds needed for certain clients (Mac, Linux, etc?)

_
Thank you,
Gregory R. Scholz
Lead Network Engineer
Information Technology Group
Keene State College
(603)358-2070


-Original Message-
From: Bennefield, Cully A. [mailto:[EMAIL PROTECTED] 
Sent: Thursday, January 19, 2006 9:23 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] 802.1x- Who's doing it and how far along

We've been doing 1x for about two and a half years now.  We are using 
EAP-PEAP with MS-CHAPv2 and Microsoft's IAS Server as our RADIUS server.
Also, for the past six to eight months we have been using 1x to delegate
different policies to users based on Active Directory group membership.

Cully Bennefield
Baylor University

-Original Message-
From: Lee Badman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, January 19, 2006 7:56 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] 802.1x- Who's doing it and how far along

Knowing that this can be a large topic, will try to keep the questions
simple for all:

- How many of you are using 802.1x as your primary production wireless
security mechanism?
- EAP type(s)?
- RADIUS type?
- Has anybody started down the 802.1x road, then bailed out with no
intention of going back to it? Why?


That's all! Trying to keep it brief for everyon'e sake while still
gathering what I need...

Regards-

Lee

Lee H. Badman
Network Engineer
CWSP, CWNA (CWNP011288)
Computing and Media Services (NSS)
250 Machinery Hall
Syracuse University
Syracuse, NY 13244
(315) 443-3003 Voice
(315) 443-1621 Fax

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


RE: [WIRELESS-LAN] Rogue Detection in Dorms...

2006-01-06 Thread Scholz, Greg
I believe that is Sascha's point.  They can not necessarily connect it
to the campus owned network. That is within our rights to say. But
what about even forbidding the running of the AP.  Why would the
student want an AP that is not connected to the network?  Who cares,
when drafting a policy that stands on the foundation of running
unlicensed equipment it is bound to be fought.  However, basing it on
what can be connected to the network is relatively easy. This is what
we currently do in our CNUP.

http://www.keene.edu/policy/cnup.cfm
http://www.keene.edu/it/security/connect.cfm


_
Thank you,
Gregory R. Scholz
Lead Network Engineer
Information Technology Group
Keene State College
(603)358-2070


-Original Message-
From: Zeller, Tom S [mailto:[EMAIL PROTECTED] 
Sent: Friday, January 06, 2006 11:46 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Rogue Detection in Dorms...

I don't agree with this analysis.  Students may have the right to use
the spectrum on their personal network.  I don't believe they have an
inherent right to broadcast the university's network out into the dorm
parking lot.  

[I'm not a lawyer, but I could play one on TV]

Tom Zeller
Indiana University

-Original Message-
From: Sascha Meinrath [mailto:[EMAIL PROTECTED] 
Sent: Friday, January 06, 2006 11:32 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Rogue Detection in Dorms...

Hi all,

  Date:Thu, 5 Jan 2006 08:12:21 -0500
  From:Lee Badman [EMAIL PROTECTED]
  Subject: Re: Rouge Detection in Dorms
 
  I know that we found that finding rogues is almost meaningless if
there =
  isn't strong policy to back up their removal and banishment. We get =
  push-back that the students' rooms are their homes, and in their
homes =
  they should be able to do their own wireless, etc... That notion gets
=
  weaker if you have wireless everywhere, but still the written policy
with =
  senior management sponsorship and very clear communication to
students =
  that such devices aren't allowed needs to be in place- just as
important =
  as any software or tools.=20
 
  I still toy with this idea- through the wire detection- as much as
(or in =
  concert with) a sensor-based solution: www.wimetrics.com=20

I suspect that rogue suppression and elimination of unlicensed devices
from 
student's dorms is a practice that is without legal protection and would

seriously caution any University from engaging in this practice.  It's
one thing 
to prevent connection to your network of unauthorized devices (which is
clearly 
within a network administrators rights), but it's quite another to
remove or 
banish unlicensed devices outright.

It's not so much that that students rooms are their homes as that no one
has any 
exclusive property rights to unlicensed frequencies -- everything from 
clarifying statements from the FCC and the OTARD rules back up students'
rights 
to buy, deploy, and use unlicensed devices wherever they choose.  If
there are 
any telecom lawyers on this list, I would love to hear some
clarification on the 
legal ramifications of enforcing a banning and removal of unlicensed
devices, 
but I anticipate that the law will back up the students rights to
utilize these 
devices.

--Sascha


-- 
Sascha Meinrath
Policy Analyst*  Project Coordinator  *  President
Free Press   *** CUWiN   *** Acorn Active Media
www.freepress.net *  www.cuwireless.net   *  www.acornactivemedia.com

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.


Wireless Charges

2006-01-04 Thread Scholz, Greg








We are moving to include wireless access in our charge back model.
Currently we charge for active data jacks so at this time any installed
wireless access points get charged only at the rate for the single data jack
required for the AP. We do not charge by IP, user, or connected computer:
if it has a connection to a switch, it is paid for at a flat monthly rate.



We would appreciate any information on how other schools are handling
charging for wireless access including how the charge was derived.



Thanks in advance





_

Thank you,

Gregory R. Scholz

Lead Network Engineer

Information Technology Group

Keene State College

(603)358-2070








**
Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.